How a hacker unearthed the TSA no-fly list

Jan. 30, 2023
What began as bored browsing ended with 1.5 million entries from an FBI database, Steve DaSilva reports for Jalopnik.

WASHINGTON - We’ve all been bored on the internet, right? Aimlessly scrolling through Twitter or clicking through TV Tropes, eyes glazing over as we spend hours doing the online equivalent of re-checking an empty fridge. But some people, it seems, use their boredom-induced internet browsing for more than just re-reading all of Catra’s tropes. Some use it to shine a light on the American surveillance state, Steve DaSilva reports for JalopnikContinue reading original article.

The Military & Aerospace Electronics take:

30 January 2023 - Cyber security is obviously a concern for not only trade secrets in the mil-aero industry and the agencies and military branches they serve, but for the fine folks at the FBI, CIA, NSA, and others. A Swiss woman who goes by the nom de fouineur "mia arson crimew"added another success to her digital snooping portfolio, including Nissan's source code and security footage from Tesla factories.

This time out, she found her way into a server that kept default credentials in place and left with 1.5 million names and aliases of people on the FBI "no fly" list.

The hack serves as a reminder to always change your default security passwords.

Related: Trusted computing for national defense

Related: House passes bill to improve FAA system that grounded flights

Related: AUVSI launches campaign to help states prepare for the future of advanced aviation

Jamie Whitney, Associate Editor
Military + Aerospace Electronics

Voice your opinion!

To join the conversation, and become an exclusive member of Military Aerospace, create an account today!